A New Day at the OfficeThis blog will provide an out-of-the-box approach to emerging technologies that the IT industry is dealing with every day. I will discuss technical topics from everyday events at the office. As a consultant I see new technologies daily and will discuss how those technologies are utilized, what's good, what's bad and what's just a buzz.

Application Sales & Development: The Progress 4GL at WorkFollow one Senior Consultant with extensive experience in software development and consulting, including Fortune 100 clients, and a specialist in the high productivity, short development time application business, as he shares real-world stories and case studies from the field of developing, selling, and maintaining applications that just work.

Bridging the Gaps: Using Connections, Technologies, Strategies, & Human InterestsTechieDolphin will journey through her past perspectives from the engineering, project management, and enterprise architecture world in a range of industries including aerospace, education, and financial institutions. Her emphasis will be on collaboration and enterprise architecture technologies and processes along with insights for working in a geographically diverse setting.

Enterprise Design Strategy: Aligning IT & Business PracticesJurgens Pieterse is an Enterprise Design Strategist. His mission is to streamline a business enterprise as a whole system to create value for shareholders, customers and employees. With a strong background in business process engineering, enterprise architecture, and IT investment planning he shares unique perspectives and firsthand experiences to make the marriage between IT and Business work. He writes on diverse topics which includes the implementation of IT strategies, demands on IT leadership, and emerging technology trends.

Intrusion Detection SystemsWith today’s environment of evolving technologies and the intrusive attacks that accompany these, organizations find themselves in a position where they must generate the capability to monitor and respond to these attacks. Intrusion detection comes in many forms and shapes with a multitude of capabilities. This blog will attempt to cover many of the well-known offerings and solutions. Topics covered may range from installations, configurations, management, troubleshooting, and scalability. Participants are strongly encouraged to share their working knowledge, making this blog more of a collaborative effort with the combined input of numerous experts in this field.

Wireless Device Dimension"Wireless Device Dimension" provides news, views, and discussion of mobile wireless devices and applications. You'll find the latest information on smartphones, PDAs, and other wireless communicators. We'll also discuss the best ways to configure and use your devices to keep you connected and simplify, rather than complicate, your life.